Events

What is a Phishing Scam? (And What to Do to Stop Attacks)

70% of ransomware attempts come from Phishing. Learn how and why attackers use phishing scams to target the enterprise

READ MORE

Listen Up! SentinelOne CRO on the RiskyBiz Podcast

How SentinelOne Differentiates Itself in the Highly Competitive EDR Space? Hear Nick Warner, SentinelOne CRO on the popular Risky.Biz podcast

READ MORE

SentinelOne’s Autonomous EDR Cuts Through the MITRE ATT&CK Noise

Demystifying MITRE’s ATT&CK Evaluation: Imagine if each alert you received was actually usable and could tell a complete story – that’s exactly what SentinelOne did in the MITRE ATT&CK

READ MORE

The Enemy Within – Top 7 Most Disturbing Data Breaches in 2018

Enterprises share the risk posed by insiders, which continues to grow each year at a significant cost in terms of both money and resources

READ MORE

Malicious Media | Why Your Endpoints Need Device Control

If your security solution does not manage USBs, your endpoints are beyond your control

READ MORE

Feature Spotlight – Firewall Control

Endpoint Firewall Control allows IT & security teams to manage and enforce network access policy to and from endpoints, even outside the corporate network

READ MORE

Feature Spotlight – Device Control

IT & security teams need full visibility and control over how USBs and other peripherals are used. Learn about SentinelOne’s new Device Control feature

READ MORE

How Malware Can Easily Defeat Apple’s macOS Security

or the one where we argue why your business really needs antivirus protection

READ MORE

How We Detected a Real Empire Exploit Attack

The post describes an attack that was carried out during a POC at a customer site and handled by the SentinelOne Agent and Vigilance service

READ MORE